<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-moriarty-attestationsets-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="SRASCA">Scalable Remote Attestation for Systems, Containers, and Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-moriarty-attestationsets-07"/>
    <author initials="K. M." surname="Moriarty" fullname="Kathleen M. Moriarty">
      <organization>Self Employed</organization>
      <address>
        <postal>
          <region>MA</region>
          <country>USA</country>
        </postal>
        <email>kathleen.Moriarty.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization>Beyond Identity</organization>
      <address>
        <postal>
          <street>3 Park Avenue</street>
          <city>NY</city>
          <region>NY</region>
          <code>10016</code>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@beyondidentity.com</email>
      </address>
    </author>
    <author initials="A.J." surname="Stein" fullname="A.J. Stein">
      <organization abbrev="NIST">National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899</code>
          <country>USA</country>
        </postal>
        <email>ajstein.standards@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="28"/>
    <area>Security</area>
    <abstract>
      <?line 62?>

<t>This document establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls that are defined and grouped by an external entity, preventing the need to send over individual attestations for each item within a benchmark or control framework.
This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats for use as an Entity Attestation Token (EAT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://aj-stein-nist.github.io/draft-moriarty-attestationsets/draft-moriarty-attestationsets.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-moriarty-attestationsets/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aj-stein-nist/draft-moriarty-attestationsets"/>.</t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Posture assessment has long been desired, but has been difficult to achieve due to complexities of customization requirements at each organization.
By using policy and measurement sets that may be offered at various assurance levels defined in an Entity Attestation Token (EAT) profile <xref target="I-D.ietf-rats-eat"/>, automating posture assessment through attestation becomes achievable for organizations of all sizes.
The measurement and policy groupings in an EAT profile may be provided by the vendor or by a neutral third party to enable ease of use and consistent implementations.
This provides simpler options to enable posture assessment at selected levels by organizations without the need to have in-house expertise.
The measurement and policy sets may also be customized, but not necessary to achieve posture assessment to predefined options.
This document describes a method to use existing attestation formats and protocols while allowing for defined profiles of policies, benchmarks, and measurements for specific assurance levels that scale to provide transparency to posture assessment results summarized with remote attestation.</t>
      <t>By way of example, the Center for Internet Security (CIS) hosts recommended configuration settings to secure operating systems, applications, and devices in CIS Benchmarks developed with industry experts.
Attestations aligned to the CIS Benchmarks or other configuration guide such as a DISA STIG could be used to assert the configuration meets expectations.
This has already been done for multiple platforms to demonstrate assurance for firmware according to NIST SP 800-193, Firmware Resiliency Guidelines <xref target="FIRMWARE"/>.  In order to scale remote attestation, a single attestation for a set of benchmarks or policies being met may be sent to the remote attestation management system.
On traditional servers, assurance to NIST SP 800-193 is provable through attestation from a root of trust (RoT), using the Trusted Computing Group (TCG) Trusted Platform Module (TPM) chip and attestation formats.</t>
      <t>At boot, policy and measurement expectations are verified against a set of "golden policies" from collected and attested evidence.  Device identity and measurements can also be attested at runtime.
The attestations on evidence (e.g. hash of boot element) and verification of attestations are typically contained within a system and are limited to the control plane for management.
The policy and measurement sets for comparison are protected to assure the result in the attestation verification process for boot element.
Event logs and PCR values may be exposed to provide transparency into the verified attestations.  Remote attestation provides a summary of a local assessment of posture for managed systems and across various layers (operating system, application, containers) in each of these systems in a managed environment.</t>
      <t>There is a balance of exposure and evidence needed to assess posture when providing assurance of controls and system state.
Currently, logs and TPM PCR values may be passed to provide assurance of verification of attestation evidence meeting set requirements.
Providing the assurance can be accomplished with a remote attestation
format such as the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>
and a RESTful interface such as ROLIE <xref target="RFC8832"/> or RedFish <xref target="REDFISH"/>.
Policy definition blocks may be scoped to control measurement sets, where the EAT profile asserts compliance to the policy or measurement block specified and may include claims with the log and PCR value evidence.
Measurement and Policy sets, referenced in an EAT profile may be published and
maintained by separate entities (e.g.  CIS Benchmarks, DISA STIGs).
The policy and measurement sets should be maintained separately even if associated with the same benchmark or control set.
This avoids the need to transition the verifying entity to a remote system for individual policy and measurements which are performed locally for more immediate remediation as well as other functions.</t>
      <t>Examples of measurement and policy sets that could be defined in EAT profiles include, but are not limited to:</t>
      <ul spacing="normal">
        <li>
          <t>Hardware attribute certificates, TCG</t>
        </li>
        <li>
          <t>Hardware Attribute Certificate Comparison Results, TCG</t>
        </li>
        <li>
          <t>Reference Integrity Measurements for firmware, TCG</t>
        </li>
        <li>
          <t>Operating system benchmarks at Specified Assurance Levels, CIS</t>
        </li>
        <li>
          <t>Application hardening Benchmarks at Specified Assurance Levels, CIS, DISA STIG</t>
        </li>
        <li>
          <t>Container security benchmarks at Specified Assurance Levels, CIS</t>
        </li>
      </ul>
      <t>Scale, ease of use, full automation, and consistency for customer consumption of a remote attestation function or service are essential toward the goal of consistently securing systems against known threats and vulnerabilities.
Mitigations may be baked into policy.
Claim sets of measurements and policy verified to meet or not meet Endorsed values <xref target="I-D.ietf-rats-eat"/> are conveyed in an Entity Attestation Token made available to a RESTful
interface in aggregate for the systems managed. The Measurement or Policy Set may be registered in the IANA registry <xref target="iana">created in this document</xref>, detailing the specific configuration policies and measurements required to adhere or prove compliance to the associated document. Levels (e.g. high, medium, low, 1, 2, 3) or vendor specific instances of the policy defined in code required to verify the policy and measurements would be registered using a name for the policy set, that would also be used in the reporting EAT that includes the MPS along with other artifacts to prove compliance.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="policy-and-measurement-set-definitions">
      <name>Policy and Measurement Set Definitions</name>
      <t>This document defines EAT claims in the JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/> registries to provide attestation to a set of verified claims within a defined grouping.
The trustworthiness will be conveyed on original verified evidence as well as the attestation on the grouping. The claims provide the additional information needed for an EAT to convey compliance to a defined policy or measurement set to a system or application collecting evidence on policy and measurement assurance, for instance a governance, risk, and compliance (GRC) system.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Claim</th>
            <th align="left">Long Name</th>
            <th align="left">Claim Description</th>
            <th align="left">Format</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">MPS</td>
            <td align="left">Measurement or Policy Set</td>
            <td align="left">Name for the MPS</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">LEM</td>
            <td align="left">Log Evidence of MPS</td>
            <td align="left">Log File or URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">PCR</td>
            <td align="left">TPM PCR Values</td>
            <td align="left">URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">FMA</td>
            <td align="left">Format of MPS Attestations</td>
            <td align="left">Format of included attestations</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">HSH</td>
            <td align="left">Hash Value/Message Digest</td>
            <td align="left">Hash value of claim-set</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="supportability-and-re-attestation">
      <name>Supportability and Re-Attestation</name>
      <t>The remote attestation framework shall include provisions within the system and attestation authority to allow for Product modification.</t>
      <t>Over its lifecycle, the Product may experience modification due to: maintenance, failures, upgrades, expansion, moves, etc..</t>
      <t>The customer can chose to:</t>
      <ul spacing="normal">
        <li>
          <t>Run remote attestation after product modification, or</t>
        </li>
        <li>
          <t>Not take action and remain un-protected</t>
        </li>
      </ul>
      <t>In the case of Re-Attestation:</t>
      <ul spacing="normal">
        <li>
          <t>framework needs to invalidate previous TPM PCR values and tokens,</t>
        </li>
        <li>
          <t>framework needs to collect new measurements,</t>
        </li>
        <li>
          <t>framework needs to maintain history or allow for history to be logged to enable change traceability attestation, and</t>
        </li>
        <li>
          <t>framework needs to notify that the previous attestation has been invalidated</t>
        </li>
      </ul>
    </section>
    <section anchor="configuration-sets">
      <name>Configuration Sets</name>
      <t>In some cases, it may be difficult to attest to configuration settings for the initial or subsequent attestation and verification processes.
The use of an expected hash value for configuration settings can be used to compare the attested configuration set.
In this case, the creator of the attestation verification measurements would define a set of values for which a message digest would be created and then signed by the attestor.
The expected measurements would include the expected hash value for comparison.
The configuration set could be the full attestation set to a Benchmark or a defined subset. These configuration sets can be registered for general use to reduce the need to replicate the policy and measurement assessments by others aiming to assure at the same level for a benchmark or hardening guide. This document creates an IANA registry for this purpose, creating consistency between automated policy and measurement set levels and the systems used to collect and report aggregate views for an organization across systems and applications, such as a GRC platform.</t>
    </section>
    <section anchor="remediation">
      <name>Remediation</name>
      <t>If policy and configuration settings or measurements attested do not meet expected values, remediation is desireable.
Automated remediation performed with alignment to zero trust architecture principles would require that the remediation be performed prior to any relying component executing.
The relying component would verify before continuing in a zero trust architecture.</t>
      <t>Ideally, remediation would occur on system as part of the process to attest to a set of attestations, similar to how attestation is performed for firmware in the boot process.
If automated remediation is not possible, an alert should be generated to allow for notification of the variance from expected values.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats.
The contents of the benchmarks and controls are out of scope for this document.
This establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls as defined and grouped by external entities, preventing the need to send over individual attestations for each item within a benchmark or control framework.
This document does not add security consideration over what has been described in the EAT, JWT, or CWT specifications.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>Draft section - authors know more work is needed to properly define the registry and claims. This section is here now to assist in understanding the concepts.</t>
      <t>This document requests the creation of a Measurement and Policy Set (MPS) registry. The MPS registry will contain the names of the Benchmarks, Policy sets, DISA STIGS, controls, or other groupings as a  policy and measurement set that <bcp14>MAY</bcp14> correlate to standards documents containing assurance guidelines, compliance requirements, or other defined claim sets for verification of posture assessment to that MPS. The MPS registry will include the policy definition for specific levels of MPS assurance to enable interoperability between assertions of compliance (or lack thereof) and reporting systems.</t>
      <table>
        <thead>
          <tr>
            <th align="left">MPS Name</th>
            <th align="left">MPS Description</th>
            <th align="left">File with MPS definition</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Ubuntu-CIS-L1</td>
            <td align="left">Ubuntu CIS Benchmark, level 1 assurance</td>
            <td align="left">http://   /Ubuntu-CIS-L1.txt</td>
          </tr>
        </tbody>
      </table>
      <t>The MPS name includes versions or level information, allowing for distinct policy or measurement sets and definitions of those sets (including the supporting formats used to write the definitions).</t>
      <section anchor="additions-to-the-jwt-and-cwt-registries-requested">
        <name>Additions to the JWT and CWT registries requested</name>
        <t>This document requests the following JWT claims per the specification requirement required for the JSON Web Token (JWT) registry defined in RFC7519.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="mps-measurement-or-policy-set-claim">
        <name>MPS (Measurement or Policy Set) Claim</name>
        <t>The MPS (Measurement or Policy Set) claim identifies the policy and measurement set being reported. The MPS <bcp14>MAY</bcp14> be registered to the MPS IANA registry. The MPS may be specified to specific levels of assurance to hardening, loosening guides or benchmarks to provide interoperability in reporting. The processing of this claim is generally application specific.
   The MPS value is a case-sensitive string containing a StringOrURI
   value.  Use of this claim is <bcp14>OPTIONAL</bcp14>.</t>
        <t>This document requests the following CWT claims per the specification requirement required for the CBOR Web Token (CWT) registry defined in RFC8392.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
              <th align="left">JWT Claim Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
              <td align="left">MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
              <td align="left">LEM</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
              <td align="left">PCR</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
              <td align="left">FMA</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
              <td align="left">HSH</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="15" month="January" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-25"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8832">
          <front>
            <title>WebRTC Data Channel Establishment Protocol</title>
            <author fullname="R. Jesup" initials="R." surname="Jesup"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>The WebRTC framework specifies protocol support for direct interactive rich communication using audio, video, and data between two peers' web browsers. This document specifies a simple protocol for establishing symmetric data channels between the peers. It uses a two-way handshake and allows sending of user data without waiting for the handshake to complete.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8832"/>
          <seriesInfo name="DOI" value="10.17487/RFC8832"/>
        </reference>
        <reference anchor="FIRMWARE">
          <front>
            <title>Platform firmware resiliency guidelines</title>
            <author fullname="Andrew Regenscheid" initials="A." surname="Regenscheid">
              <organization/>
            </author>
            <date month="May" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-193"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="REDFISH" target="https://www.dmtf.org/sites/default/files/standards/documents/DSP0266_1.20.0.pdf">
          <front>
            <title>Redfish Specification Version 1.20.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 232?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Thank you to reviewers and contributors who helped to improve this document.
Thank you to Nick Grobelney, Dell Technologies, for your review and contribution to separate out the policy and measurement sets.
Thank you, Samant Kakarla and Huijun Xie from Dell Technologies, for your detailed review and corrections on boot process details.
Section 3 has been contributed by Rudy Bauer from Dell as well and an author will be added on the next revision.
IANA section added in version 7 by Kathleen Moriarty, expanding the claims registered and adding a proposed registry to define policy and measurement sets.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8VbbXMbN5L+Pr8Cp3xY6YqkLDuXOKq93dCSbCtrvZwoby7l
cl2BMyA50XCGO5iRzMT5L/db7pfd090ABkNR8qVOqXWVS+QM0Gg0up9+A4fD
YXJ7qF4kSZM3hTlUk1QXeloYdWWWVWPUuGmMbXSTV6WaVbWarG1jlnagjqqy
0XlpanzWZabGq1WRpzzQJno6rQ3oTq7Gk6NxklVpqZegntV61gyXVZ3rulkP
dUfcmsYOn32bgMKhsk2WpPSstK09VGtjE9tOl7m1GNmsV6B0enL9Oinb5dTU
h0mmG3MYz2jq1iS6NhosmLSt82ad3Jj1XVVnh0mS3JqyxQSl5nXVrg7Vjt/s
dbfZy7pKTdbWZqJ2a93YvR2Ml7V3fqzqm7ycqzc0nZ4vdV7gOY37PjfNbFTV
c3qu63RxqBZNs7KH+/s0ip7kt2bkR+3Tg/1pXd1Zs0/z94mtvFm000Olfx5C
2nk5LHPb7D8uPEwrND3p1utNHwnRUV59gdAXXo8WzbJIEt02iwqiHyo52b/p
ZlEYU6qzkTpzU8ESdkhHUMzUyXJVVGuT4aERcd24KSM/noXy/ZzejtJqiZG1
mWPZQ3U2xpe0asumXh+q95NxWPeMFEL9mFsQLf2Cr8y6gkqeZqZscubDLbmk
0aM7Gf39lIflbpRb0ja1MRDiC3Wp6xs1Zl3h1TMs96eDZ88OvvkTfceUQ3X+
U8Qlf9nK5Xj0w0hN6Cw8i+csUF2o09Ji9RbaV80wBKak68yySV2bdFFWRTWn
HXiTOj+dXHcb0j/zCY+sn9gTn98LmFavoMq6Vcc1tK/bzvNnL7/7rtvOGw0l
gUlP23oei/94c2NJWdVLbOGWzejq9dHzg4Pv3MeXL7577j5++2/y9HR4zIc7
JA0fGth4kuTlbIPGy5cveOLr06uzH8dXJ4fq+OJ0dPBs9M2z5y/3aeOjyeXo
5bNnw4PvXtCUk+PXp5O3NAWmqeu5iZT/7u5ulC2dkdkcOryfmZlui2Z/lhf4
FkS2D3hql1ACu388uXz2/Jtv/utg9PzZ6Nlolc2EtmDjlclmuV2oycqk+cyB
nfo75EV/ZU6SDIdDHBZEr9MmSa4XuVV+AUWGNC1Aw9AJMzyAs7Rpa2jCiiyt
LtUdTsBM10pD/gxLkQXSKRSZmhoFMGxNxpis8RTWZTAUFkp6NDVlulhCfy20
DW9xcFVhVbPQDRY1CpIAdGesZYyB+Ewrlsp8Ih7AjRjFQK2gdfQZcAfVUKXB
0KbCQpha3Zpa5TCh2zxrMSeGCubM6HShsMOluoNi5dhxx1rEmZrVMBOg883o
MYEFCWF9PGtot3Zju7SjsF+36NGP1/z8B/wVnRPuWgvZ8kGc8GZ7zu66ugGa
7Z6Mr/dGcqjLPMsKkyRfwWZBP2tTGpgkl5XFARIpa6xlthcgW1QQ2ZQgMTM2
r002UNNWXsnTfAYdgj7SdiCnHHJWWWvoq5znp7zJDW8wbW1TLfNfhLXa/KMF
QVZZyFykDDXXpRsxSl6tsTs6s1UFr7zm7S+Ntq1ME8mxOiz1mtSpms2gdRmR
u9V1XrWW9gO9LFOjCrAGcXqtoXP8ksygNxXZmfpwz/Y/ImBosR3dCIP3pNcs
oJLzRU/vpwYyISVgQXGEQkcY75olpYtC2fwXY0mTTG/PJAMnDtZ5rG79XsbX
gWEnEHyFVotdkOLDCDJekA0FdtA2ZLRQsBpkyX3RwZmSWcOqjOesYaKRFgpL
XOR0ssSP8OwU3q1mwTu9xzor2VJHc4ugNB1kAfwAm+6MwFxfJmQDVdv0jHeh
oWqIC/ACDJpPK1M38ImPiow1hmSjC1uRgLxOesUuK/w3KXjT9TrW6W0nXBGu
eH1ye920fYgjrfMpW/7SYBfMu3AMYZLy6H50ypbNPNdVU6UMAQs6U2hFdUcT
SGf8su7AWW14kzC2QYQlg02rEdSwDv3v2wfbk0UAbWSDfKSIRXVpoSCgy2LZ
Io7aWOAADr9dYmUSKR/bFvwHFMG073AMYNp80qQsAz7bIxCC3hCHp/SphCfw
sa/aPTqd7KkFVrYgCkvCsqTb0MtZPscuWII44oaNgvE9JSYrqIbYqfWBv44C
fRFRZm5znDvZEtZB9BXQOCPBVCu/H7gKKA20Q1QOJz6OPYYu8nkpGso76tMi
46PgZIPpeUtCti0gkLBcHZ9Oxmpyffqmc5VQGSZKEq/FEvo0loaUm5hK+2ZJ
YK0LBE7Z2oF2VQrwLHFg+YrMElE3qR5LLcOBleT6GxOpB42f5fXyjlyvTlNk
IexOKw7m1ORSuZhmoF77YVfwGUXOOvOGdlhAZa364EOjjyMEVSVkkkEgdFys
dff1BQekyA8UZtNW6MW2YMFbAh4TkzA8j4jWWS7Jb0tkgohaz513YV0ZJRcl
aX+Wu1AX0r+VfDGI5r4MlENDxrxtnmBWV0uKjaqKuUeqh0hg96q63hs4n0cM
XtNjHPsRPGnbhGRN7V4fvdkLby/d4SGNyFqst3t9ebangFsrVuwt8AIDHDdq
isUHD/nWWI842sKmARjkXOfImMFtEP3OvCqQfgSh78jugFwO1Tsu8MUQnkBq
OPtjNjnlc5f7SJVSeOmQOhAAPNUI4vOlg/pevIY9+gXUrhnNR6T9C1YQErUR
r7XHS8mOXABMXrdnxtgyEmW8Loo1B2Oa8TaEgKIesjeMLfJl3nRm72NCGJa3
taBZwvZjMc2Mo8ol8Da3Vcn0yRmINAUDCNdEhwl1CbWaviz621tRIcAK5VgS
o+SEAmPEeXNxOpdHV4iditZYbzHQhMphz1ZvkJduz52GRILEMV/dN7MQKWjn
LtgVaLCRUgTeORX2auJqOiFmHsdF+mldYWc+4Cv0GuapdjdBv4f5g3Citd0j
4Un0OaN9wDV78nzQfk1T3uZ1VYrU6Ahryl8oGdAFwwA7M3DLfrHsNJ0jlg68
wavfEpIkLwsOBAKiULTs438i5ZSNxAetP2priL4pkNiEc4PNbzm7FS3YO7re
Go9YQMc9+RUWo2l6QfsouQycs+4FymS2U3EScO2U9zjXuS0ZTASTgvMjUl+I
yrdE4wlrApLpyfWsLUgnTT3TaedTry7enZ6oDy5B/0hOApnwa8qEP7gU/CN2
JEbJwVUuITtU8ibI06YcB3ByIwa+absDyXxlG1FALm7bSlKUe7fRdEBA2h3R
4nV9mOYwlJjIy7RocY5pofOlBMZMBYrQt98OaJOzjWD4sguGBzgRypkwLnsk
jWin7hgxPVnCbhwaTokKgIBCBQZx8rmCuxuRz6CLaezelxHQLnzcE63mlwIg
Uzqv8hmJtUpz3XgNI1FYpOHbM3SQdjGRvq3yzPbyCQY1OfSAZmtSbuedyHy9
/jp7JEiKKgfbN8ThOykhoTi0EupOmU4lnoVRrSIoQTib0U5oDf5EnEBz70xB
kOjixllbpi64S04kdObY/7GEh0P6EEhGCXB01NZrluRBxCzlQp1bO0ySoXqr
60wCwKZBVkMFv5TSLgYRSjwQmMTDxmHYUTeMwxnn2q4kafATr7wycvg/57D/
bDN38VGon3SxgfS9SkrjC13YxDgg1DvOdQakoyAQVf0RLiAaLYnYq99DJVJv
EAxtBclAaBe/j6eEOhjYYJSCD3D0pAiu6MBRcZyUp6JLktBKggHXugrQvi3a
9cpENkJxLUVjdGzwUaT0VBmoIOmMDWJe4bs4JlcGKNZuf11mFaLDm7K6I0NC
2uHS2du2gET0FBkBwQRgCX/nLtxyQDPVN6yZnGGSAsPZEdCFIlnPriI9D7EH
ZpLDoh2R/vLnEyp6kB90znGL/+BtY2e3Zv3l2tBSkyO9pUbIVNLk4HmSzvMQ
kfm8NnNSeToaxiYnJhdUjBQBYYzPGOfgedIlLVTCxrxaWCM6p+PzsXuM2OlD
SmL2b6Pyw8fdr+BrNJKKzEAjC++rQ/rfTyFD2nQPwpzjlyAmYw9HaRYCALPF
pUWo7DkZOf32UXk+XwwU4Vy7pCjmbqAOBur5QL3YI8KuThXYJJWiBayL0fyx
R1hGvYAemwLg8ej7wOwxMRKwZF+aex7h2Do0HQiaykyfm3Bu7k6mNquqZjQi
dOXBDlnF3ZxdTjCPyqrssATVNYGjThvrQ7VYqiOq1h6RbpYuN8E+jkOIYjkY
VTdmrag1aNXO2fvJ9c5A/qrzC/58dfIf708R6NDnydvxu3fhQ+JGTN5evH93
3H3qZh5dnJ2dnB/LZDxVvUfJztn4px1Bo52Ly+vTi/Pxu517qigZFYuLbWRV
G87mbOJLZCzCV0eX//PfB1+rX3/9F9eQ+e039+Xlwbdf4wsFzbJaVQKB5Cuk
uE4Q4Btds+EBKVO9yhtdcKZO8QTgiPQW0vzXDySZj4fqz9N0dfD1X9wD2nDv
oZdZ7yHL7P6Te5NFiFsebVkmSLP3fEPSfX7HP/W+e7lHD//8Vyq3qOHBy7/+
JSEVuuysIEYcwpkNbeoXMGdctSFtdkGn03TqRHxw/bGPTPbIPaHm2UcPT4Qn
cQISwSkjp6siBASPIlvOv7yN+3K3BI9cMYG+0yBKqe5yHPk0wnD2avk8p5pN
oB2Smiiu2sybXfwXlmOIdkyFBJjmZKEmFLqAmOuSPS5OSYQl2QK42kDKbmvb
UwASjEhIwhqiGEUqrr7CEarflsfw+1F1yM4GLmoVQAX1OTXASnmFoOzGxxWB
1d03V0d7oRyWfFbikj+rd4Ri54ST9/75Qcds2xKF3BvyWjK/z8nnofzzf7f+
e/TlxhCQZKClVR72rnh5HqO8zNjk0n8AyXcnZ/zoHZKtkyDzWTxRXr6m5AlU
31+dbpNNRJLyNXrk8/e/S4jSH7+VzIMkX5+NY/E6/npF6vil8079ss0GybeT
t0zyLRXTmMX9M+qRzI06zueYFV5K7klhIp3/kHR4G5eAo0m7Ik8pAaEo7JUZ
RmyKX9sWtvpGK2CdkN7nxGydNjSMHEzFhbqIiNz98IkdtVZYDy6lJ4qcLAul
ESj9BTeJ4Z+LfGbSdeobFmG4dv2AXGom0WzXDj2UTNY4S5shGoNWwju1q3mN
gBKfQIBSUArtlzBKetKkIyk2RYE9YCVdVNb4pOyqLbdJSc+olbLasp8BVBPz
zhEfNwi4lZYkgCRU05WMUrXlMBQck+RUBJm6ZKR/SsxCdyIEf4z3eQlVyOlS
E3ffuTa3UaSiBRuKqO1gOw0HcXhw1wvcHhjuSwWILiGrmgG1O1n/UGKQoprP
JU50ncl0ocs5lzZTE3Sy14Mos+3LIs+QQFNLWyZsNz6N0DHv5JK5uC4KwCd0
B4rkbXHULHAoQR7ygH63nak777KtAeZhjT075W4IqNupRYgsbddIVTar4a5c
7BvQrRw836xYSRV60Rm7VKu3suAqgb53JTVtE7ncbe27kShcblkAYmec4FDz
bPZ4nXtLeC9ONgo0RPmIa1eYwSzBskywLKQFPq1iRaVarZXenuumCxdVLUIK
otnCg0eoJh53T4S+KiL07smlK+EQGakGRHII4cKruPTVBRl89g2HM3YL9XBY
US5EbM0NZe0F6wDI43Gbml7hDBlPIYWdh3OtqKYv7X2+oaXgIlwT0bU0nAlx
CY8b0q7L1yvndTUa7pvSluKIVU6Nr8T002QxCGrNtTX1NAYylAjFZZSpae7I
Ul2ppYvPtlQqfdfcaUjI7zuNFwQTbCV/FxUFbnNzZ32kGF948D2NXpuj17Hu
WsUIzkL7ljPFq658CCiZxcw/YKX9uNN2pplVXRElqK3Yz6BXpiTx8/0ggtJR
Mg6Siwd1xU9pBlCj3F+k+MXUleuCRvfJCEthOjkXOcWSXIbfoW28wjSusGJq
xW1lXa4xqljLOS9XVSkNTpNyT3XkwozNAbKeqyJMzaySChGmtDSQc5MH2MY5
nGaG6rt9MQnJKk3bmkJ1H5lYvnoTShuuVdeD+IBecZA2oIs2dBuXr8PAzcVw
QGoeZNFr3ru4iNuAbrERKYreemqgQzoAe7H5lMIe7snSFYSuRi8Y4ZuTweOy
Y4zaS1xWB8TJfQLqEW8oFetvuO9xRDaZmVpvzUv/qEt1AXwbtgXH9kN0SJ50
MQnDuDfUYUwofAnf/+RLk9o+dF2yf1eSbw/9c29LZpURlUOC3dXP01gZhIs7
goDuJmJcRXLdtwEdLEW7fNA2vvEqusb+oa9n6lcumf6WJMd0hZw44CWHLmOw
XNqWng3HgWQgocELe4LVFb4y6RDK+R/WHC4kOJfladMlHcMdlzvnC0mHOQ4H
X3zH1x8G5JCaFV/h6IuNgNHYxnbhUqj8P9D/oxR4F6nhXuDQlaORLQaeua7i
muWiDXrZlWHj/l6vqxi6IZNBUMJBd/upu7rIPuwxB8tAfzb+CWRqgDSHGZUK
956DAKznst9Jn4d7R4O4phE3siO+vI2kXdNhxuXofp98+2VA4fRy8pAU4yBw
da/R3LuV56IKl7r3bhq5dIVrqHzHweUqIWrhRrO/SRqXcbBAodMbWr821Wwv
CkqiDg5XeGjVrrAj3x8p5UQZPlc+2L/TnGh/rpTw+4s6/7eRVKV4P23Lph0e
nU6G7w6U/95vRA9cWHkQSfUz37c/3N8Hi/s9IqPmE9WnEn+g3BQI5fxbuTTP
SCtUo0LgYOO+Jl/2TJuHa33WXUMMlVgxMkr0+e2urBtaOFI+cfT50qgPOu+A
mKJmETW6AP7VV2rsqpbW92p+cC6QEDKq2Do4oST1EZyZVX6PRMYXSU3dazLd
u+/dtWl8ivrD5OJc/Wim/poHqHWoFHd5XLn5KcuQT1d9fLqi49PVGp+uxPh0
lcWnKygmrNPExO6DEt8THeiM+LGhAvxyI3GWu5bdI95J7pcKiIZ2LtYgh9XP
pZ250cteVtrN8XeMwt0A8nP3PULPG4RUmJqogIouK2ZUiqLBqAVzz3fkZecH
hB+XFxA1RiEqxohorK8IIMiJ2xGe0xH92MhvSQ6Pb8lRLWdIP23M6cdS9Ksu
l3cHn60m/Oyihi4SEZ48Uuq9VJ/6TPiG1+NxUIdPR/8vfDp6dXEV49PRI/hE
za8nbZMQtMowJvIHtEv+AATbfPqU7ROh0yP9VG0UodMj/VTtFKHTI/1UbRWh
E5GW33pNEe25GrNcw0L2kvx6KD84Ntm/78x0Yc3Ob2RCurxR66qVeh4Vprg8
51NdNxkpFyDHFO4OZL6Uqwr38t2I2HmOiPNNXU1NUZo1EgPquobfhHK6SXqE
0bVbuL+qaxOHW4b+V0CPXB6MOBioiV5qPP+bvtF1oXn82zb/uS3Vf+auCPEY
S3JthksiEW9IRNJw3zyuo7jxYGHiUrsXXYYa9iSJ91WbrdUr3dKlvsBG6EtT
xc83qUJzGxmxdLYlLf/UMFuWW1TsVHxCKQPz0oeo6ltasft5s/utsms5dcml
AGTktZiPTG4nc3LLV8ED8vGvRTjRffQ8/hcfT1gWoT8AAA==

-->

</rfc>
